Mathematics plays an increasingly important role in students’ learning and life, especially in mathematical modeling competitions, which have become an important indicator for evaluating students’ extracurricular pr...
详细信息
DC-DC power converters will play a crucial role in efficiently regulating voltage levels for various loads across different applications. Among the diverse types of DC-DC converters, the Single Ended Primary-Inductor ...
详细信息
作者:
Bounceur, AhceneKfupm University
Information And Computer Science Department Interdisciplinary Research Center Intelligent Secure Systems Saudi Arabia
In a distributed environment where IoT devices collaborate on shared data, ensuring a secure turn-taking process during data updates remains crucial. Unlike in centralized systems, the concept of mutexes is no longer ...
详细信息
Clothing parsing plays an important role in the fashion industry, and it is also a significant branch of semantic segmentation. the advanced related work explores various methods to efficiently aggregate contextual in...
详细信息
In recent years, more and more end-to-end deep learning methods have been applied to remote sensing image classification. Convolutional neural networks (CNN) is the most representative one. However, the convolution ke...
详细信息
Every day, a multitude of IoT devices connect to the internet, enhancing functionality and user experience. However, this increased connectivity exposes these devices to external threats. Securing the network requires...
详细信息
ISBN:
(纸本)9783031800191;9783031800207
Every day, a multitude of IoT devices connect to the internet, enhancing functionality and user experience. However, this increased connectivity exposes these devices to external threats. Securing the network requires effective modeling of potential attack scenarios. the dynamic nature of IoT networks often alters these scenarios, making attack modeling challenging. In this context, identifying inappropriate network configurations that lead to insecure conditions becomes a practical alternative. Avoiding such configurations helps protect the infrastructure from threat actors. In this paper, an Explainable AI (XAI) approach usingthe Local Interpretable Model-Agnostic Explanations (LIME) algorithm is employed to assess the impact of various network configurations on security. the framework's effectiveness is demonstrated through a realistic IoT network example. the experiment explains how network characteristics influence insecurity, offering valuable insights into potential vulnerabilities.
We present a Lean4 framework for the formal modeling of stateful entities in the context of functional domain modeling. the main objective is to support a step-wise refinement methodology inspired by the Event-B forma...
详细信息
ISBN:
(纸本)9783031765537;9783031765544
We present a Lean4 framework for the formal modeling of stateful entities in the context of functional domain modeling. the main objective is to support a step-wise refinement methodology inspired by the Event-B formal method. the implementation provides the main Event-B constructions such as contexts, machines, events and, most importantly, the associated refinement principles. We also experiment with extensions such as event combinators and functional variants of the (relational) refinement principles of Event-B. the embedding is very shallow in that all the constructions are directly based on the Lean4 logic and abstractions, especially dependently-typed structures and type-classes. One benefit is that proof obligations can be discharged usingthe powerful Lean4 tactic language. Moreover, we enforce the fundamental principle of correctness-by-construction: machine states, events structures and refinement steps cannot be fully constructed without discharging the prescribed proof obligations.
Despite numerous studies on trajectory prediction, existing approaches often fail to adequately capture the multifaceted and individual nature of driving behavior. In recognition of this gap and based on DenseTNT, an ...
详细信息
ISBN:
(纸本)9798350395747
Despite numerous studies on trajectory prediction, existing approaches often fail to adequately capture the multifaceted and individual nature of driving behavior. In recognition of this gap and based on DenseTNT, an end-to-end and goal-based trajectory prediction method, our study developed a new version of DenseTNT that incorporates personalized nodes within the graph neural network in VectorNet as context encoder. throughout the neural network computations, these nodes represent individual driver labels, allowing a more granular understanding of diverse driving behaviors to be gained. Based on comparative analysis, our model has a 11.4% reduction in minADE when compared to baseline models that do not have personalized labels.
eHealth research has been marked by the last two decades of scholarship spurred by technological advances and the potential of health promotion and behavior change. the study examined the state of eHealth scholarship ...
详细信息
ISBN:
(纸本)9780998133164
eHealth research has been marked by the last two decades of scholarship spurred by technological advances and the potential of health promotion and behavior change. the study examined the state of eHealth scholarship across social, behavioral and information technologies through a systematic, machine-based learning approach of the last 19 years across 811 articles. the study analyzes topics that were published using latent Dirichlet allocation of studies from 2002 to 2021;it also raises ethical challenges for researchers related to those in prior health initiatives by the CDC and in current scholarship. Results show the common topics, terms, and linguistic attributes within the state of eHealth scholarship and disparities in other areas based on topics published. Suggestions are offered for interdisciplinary collaboration to facilitate the growth and the optimal, practical use of eHealth and directions for the future.
the provision of the clean drinking water in remote and energy constrained areas have been a persistent problem in the developing world. Developing countries in general have financial constraints to expand electric gr...
详细信息
ISBN:
(纸本)9798350337938
the provision of the clean drinking water in remote and energy constrained areas have been a persistent problem in the developing world. Developing countries in general have financial constraints to expand electric grid, thus impeding the energy servicing for essential *** this end, Solar photovoltaic-powered water pumping systems (SPVWPS) have long been explored as a highly potent solution for provision of water in off-grid areas. In this context, many modeling exercises have been conducted to develop customized and optimal solutions for specific climatic conditions of different regions in the world. Most of these models simulate or validate critical aspects of the systems, such as pumped volumetric flow using climatic data as model input. these models are centered around different aspects of the energy conversion chain and models of solar photovoltaic arrays. It is rare to see models involving the volumetric flow rate by users as an input parameter. this study incorporates volumetric flow rate of the water usage as an input parameter. Such a model has not been developed and simulated for particular climatic conditions of Pakistan. this study used climatic data ( Ambient Temperature and Irradiance) and water usage volumetric flow rate as input *** water usage flow rate helps incorporate user behavior in the model, an under explored research gap in such SPVWPS models. the model was simulated on MATLAB Simulink, usingthe climatic data for Lahore, Pakistan. the representative reliability of the system design were assessed. the model serves as a simple, yet effective tool to gauge the reliability of SPVWPS designed on a static lump sum water demand basis in a dynamic setting. this reduces the chances of the over or under sizing the system and gives a preliminary estimate of the need and feasibility to incorporate cutting-edge technologies such as AI in such systems.
暂无评论